-
1
-
-
77956382087
-
A survey of mobile phone sensing
-
N.D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A.T. Campbell A survey of mobile phone sensing IEEE Commun. Mag. 48 9 2010 140 150
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
2
-
-
44449132515
-
Development of an integrated wireless sensor network micro-environmental monitoring system
-
X. Cao, J. Chen, Y. Zhang, and Y. Sun Development of an integrated wireless sensor network micro-environmental monitoring system ISA Trans. 47 3 2008 247 255
-
(2008)
ISA Trans.
, vol.47
, Issue.3
, pp. 247-255
-
-
Cao, X.1
Chen, J.2
Zhang, Y.3
Sun, Y.4
-
3
-
-
77957994676
-
Building-environment control with wireless sensor and actuator networks: Centralized versus distributed
-
X. Cao, J. Chen, Y. Xiao, and Y. Sun Building-environment control with wireless sensor and actuator networks: centralized versus distributed IEEE Trans. Industr. Electron. 57 11 2010 3596 3605
-
(2010)
IEEE Trans. Industr. Electron.
, vol.57
, Issue.11
, pp. 3596-3605
-
-
Cao, X.1
Chen, J.2
Xiao, Y.3
Sun, Y.4
-
4
-
-
84655170952
-
Cross-layer optimization of correlated data gathering in wireless sensor networks
-
S. He, J. Chen, D.K. Yau, and Y. Sun Cross-layer optimization of correlated data gathering in wireless sensor networks IEEE Trans. Mob. Comput. 11 11 2012 1678 1691
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, Issue.11
, pp. 1678-1691
-
-
He, S.1
Chen, J.2
Yau, D.K.3
Sun, Y.4
-
5
-
-
80053654205
-
Game theoretical approach for channel allocation in wireless sensor and actuator networks
-
J. Chen, Q. Yu, P. Cheng, Y. Sun, Y. Fan, and X. Shen Game theoretical approach for channel allocation in wireless sensor and actuator networks IEEE Trans. Autom. Control 56 10 2011 2332 2344
-
(2011)
IEEE Trans. Autom. Control
, vol.56
, Issue.10
, pp. 2332-2344
-
-
Chen, J.1
Yu, Q.2
Cheng, P.3
Sun, Y.4
Fan, Y.5
Shen, X.6
-
6
-
-
84905923774
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou Privacy-preserving multi-keyword ranked search over encrypted cloud data IEEE Trans. Parallel Distrib. Syst. 25 1 2014 222 233
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 222-233
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W.K. Wong, D.W.-l. Cheung, B. Kao, N. Mamoulis, Secure knn computation on encrypted databases, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2009, pp. 139-152.
-
(2009)
Proceedings of ACM SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
8
-
-
84897586040
-
Towards secure multi-keyword top-k retrieval over encrypted cloud data
-
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li Towards secure multi-keyword top-k retrieval over encrypted cloud data IEEE Trans. Dependable Secure Comput. 10 4 2013 239 250
-
(2013)
IEEE Trans. Dependable Secure Comput.
, vol.10
, Issue.4
, pp. 239-250
-
-
Yu, J.1
Lu, P.2
Zhu, Y.3
Xue, G.4
Li, M.5
-
10
-
-
0012208857
-
Term-relevance computations and perfect retrieval performance
-
W.M. Shaw Jr Term-relevance computations and perfect retrieval performance Inf. Process. Manage. 31 4 1995 491 498
-
(1995)
Inf. Process. Manage.
, vol.31
, Issue.4
, pp. 491-498
-
-
Shaw, Jr.W.M.1
-
12
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
N. Cao, C. Wang, M. Li, K. Ren, W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, in: Proceedings of IEEE INFOCOM, 2011, pp. 829-837.
-
(2011)
Proceedings of IEEE INFOCOM
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
14
-
-
38049021884
-
Cryptography from anonymity
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, A. Sahai, Cryptography from anonymity, in: 47th Annual IEEE Symposium on Foundations of Computer Science, 2006, pp. 239-248.
-
(2006)
47th Annual IEEE Symposium on Foundations of Computer Science
, pp. 239-248
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
17
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
C. Wang, N. Cao, J. Li, K. Ren, W. Lou, Secure ranked keyword search over encrypted cloud data, in: Proceedings of IEEE ICDCS, 2010, pp. 253-262.
-
(2010)
Proceedings of IEEE ICDCS
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
18
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
C. Wang, N. Cao, K. Ren, and W. Lou Enabling secure and efficient ranked keyword search over outsourced cloud data IEEE Trans. Parallel Distrib. Syst. 23 8 2012 1467 1479
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
20
-
-
84877939257
-
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
-
W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y.T. Hou, H. Li, Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, in: Proceedings of ACM ASIACCS, 2013, pp. 71-82.
-
(2013)
Proceedings of ACM ASIACCS
, pp. 71-82
-
-
Sun, W.1
Wang, B.2
Cao, N.3
Li, M.4
Lou, W.5
Hou, Y.T.6
Li, H.7
-
21
-
-
84930089295
-
-
http://kdd.ics.uci.edu/databases/nsfabs/nsfawards.html.
-
-
-
-
22
-
-
77955106680
-
Utility-based asynchronous flow control algorithm for wireless sensor networks
-
J. Chen, W. Xu, S. He, Y. Sun, P. Thulasiraman, and X. Shen Utility-based asynchronous flow control algorithm for wireless sensor networks IEEE J. Sel. Areas Commun. 28 7 2010 1116 1126
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.7
, pp. 1116-1126
-
-
Chen, J.1
Xu, W.2
He, S.3
Sun, Y.4
Thulasiraman, P.5
Shen, X.6
-
23
-
-
84864615521
-
Maintaining quality of sensing with actors in wireless sensor networks
-
S. He, J. Chen, P. Cheng, Y. Gu, T. He, and Y. Sun Maintaining quality of sensing with actors in wireless sensor networks IEEE Trans. Parallel Distrib. Syst. 23 9 2012 1657 1667
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1657-1667
-
-
He, S.1
Chen, J.2
Cheng, P.3
Gu, Y.4
He, T.5
Sun, Y.6
-
24
-
-
84862776772
-
Leveraging prediction to improve the coverage of wireless sensor networks
-
S. He, J. Chen, X. Li, X. Shen, and Y. Sun Leveraging prediction to improve the coverage of wireless sensor networks IEEE Trans. Parallel Distrib. Syst. 23 4 2012 701 712
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.4
, pp. 701-712
-
-
He, S.1
Chen, J.2
Li, X.3
Shen, X.4
Sun, Y.5
-
25
-
-
71749113079
-
Identity-based authentication for cloud computing
-
Springer
-
H. Li, Y. Dai, L. Tian, and H. Yang Identity-based authentication for cloud computing Cloud Computing 2009 Springer 157 166
-
(2009)
Cloud Computing
, pp. 157-166
-
-
Li, H.1
Dai, Y.2
Tian, L.3
Yang, H.4
-
26
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proceedings of IEEE S&P, 2000, pp. 44-55.
-
(2000)
Proceedings of IEEE S&P
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
27
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
C. Wang, K. Ren, S. Yu, K.M.R. Urs, Achieving usable and privacy-assured similarity search over outsourced cloud data, in: Proceedings of IEEE INFOCOM, 2012, pp. 451-459.
-
(2012)
Proceedings of IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
28
-
-
84928687796
-
Secure dynamic searchable symmetric encryption with constant document update cost
-
Y. Yang, H. Li, W. Liu, H. Yang, M. Wen, Secure dynamic searchable symmetric encryption with constant document update cost, in: Proceedings of GLOBECOM, 2014, pp. 775-780.
-
(2014)
Proceedings of GLOBECOM
, pp. 775-780
-
-
Yang, Y.1
Li, H.2
Liu, W.3
Yang, H.4
Wen, M.5
-
29
-
-
84924804821
-
Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage
-
H. Li, D. Liu, Y. Dai, T.H. Luan, and X.S. Shen Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage IEEE Trans. Emerging Topics Comput. 3 1 2015 127 138 10.1109/TETC.2014.2371239
-
(2015)
IEEE Trans. Emerging Topics Comput.
, vol.3
, Issue.1
, pp. 127-138
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
Shen, X.S.5
|